04-17-2010
Telnet is already disabled , I need this because I want to force users to authenticate with AD then au to local service users or rbac roles for root.
I want to make it more controlled
thx
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
After Configuring a brand new netraT1, It appears, the only way you can log in as root is throught the Serial Port (console). I believe there is a file in /etc which can be edited to allow root to access login via other methods
eg: telnet, ssh, etc.
My Question:
Which file contains... (2 Replies)
Discussion started by: SmartJuniorUnix
2 Replies
2. UNIX for Dummies Questions & Answers
Hello again !
Thanks for response of my first question. there is my second quesiton why i have local.profile instead of .profile file ?
my all files in pwd shoes local. before any file.
is anybody can tell me about that ?
Thanks
Abid Malik (5 Replies)
Discussion started by: abidmalik
5 Replies
3. Solaris
Hi all,
On Solaris 8.2 I have several printers controled via LPD so they are defined with systemnames. The problem is I can't disable them as I could in Unix V with the disable command.
Is there a way to do this however?
Thank in advance! :)
Peter (2 Replies)
Discussion started by: nulnul7
2 Replies
4. Solaris
During the Solaris 10 installation, I answered "Yes" at the "Activate Remote Access" screen - or something like that. I know this is a security issue and I want it disabled now. How can I disable remote access ?
Thanks. (4 Replies)
Discussion started by: chinezu'
4 Replies
5. AIX
If user login and don't do anything in 15 mins, the user is kicked off from the server. how to disable it? (5 Replies)
Discussion started by: rainbow_bean
5 Replies
6. UNIX for Advanced & Expert Users
Besides doing some shell-script which loops through /etc/passwd, I was wondering if there was some command that would tell me, like an enhanced version of getent.
The Operating system is Solaris 10 (recent-ish revision) using Sun DS for LDAP. (5 Replies)
Discussion started by: ckmehta
5 Replies
7. Solaris
how to login with ssh to remote system with out applying the remote root/user password
with rlogin we can ujse .rhosts file
but with ssh howits possible
plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies
8. UNIX for Dummies Questions & Answers
I have already disabled root login over the ssh by modifying /etc/ssh/sshd_config.
But how would i disable root login on a server itself.
We have implemented LDAP in our environment and our security guide states that root login must be obtained by first logging into the host using his/her own... (2 Replies)
Discussion started by: pinga123
2 Replies
9. Shell Programming and Scripting
Hello All,
I'm new to unix and i need the below favour from you.
I have list of 50 unix server. I need to login to all the server one by one and with the same user and password. I will declare the user name and password globally in the script.
for example :
servername- hyperV
user name... (4 Replies)
Discussion started by: Hari A
4 Replies
10. Solaris
Hi all,
how can I disable direct login to a Solaris system not only for root user but also for other accounts?
Looking in google I came to the following:
For telnet (/etc/default/login):
disable root access> CONSOLE=/dev/console
disable generic user> ?
For ssh... (5 Replies)
Discussion started by: Evan
5 Replies
RLOGIN(1C) RLOGIN(1C)
NAME
rlogin - remote login
SYNOPSIS
rlogin rhost [ -ec ] [ -8 ] [ -L ] [ -l username ]
rhost [ -ec ] [ -8 ] [ -L ] [ -l username ]
DESCRIPTION
Rlogin connects your terminal on the current local host system lhost to the remote host system rhost.
Each host has a file /etc/hosts.equiv which contains a list of rhost's with which it shares account names. (The host names must be the
standard names as described in rsh(1C).) When you rlogin as the same user on an equivalent host, you don't need to give a password. Each
user may also have a private equivalence list in a file .rhosts in his login directory. Each line in this file should contain an rhost and
a username separated by a space, giving additional cases where logins without passwords are to be permitted. If the originating user is
not equivalent to the remote user, then a login and password will be prompted for on the remote machine as in login(1). To avoid some
security problems, the .rhosts file must be owned by either the remote user or root.
The remote terminal type is the same as your local terminal type (as given in your environment TERM variable). The terminal or window size
is also copied to the remote system if the server supports the option, and changes in size are reflected as well. All echoing takes place
at the remote site, so that (except for delays) the rlogin is transparent. Flow control via ^S and ^Q and flushing of input and output on
interrupts are handled properly. The optional argument -8 allows an eight-bit input data path at all times; otherwise parity bits are
stripped except when the remote side's stop and start characters are other than ^S/^Q. The argument -L allows the rlogin session to be run
in litout mode. A line of the form ``~.'' disconnects from the remote host, where ``~'' is the escape character. Similarly, the line
``~^Z'' (where ^Z, control-Z, is the suspend character) will suspend the rlogin session. Substitution of the delayed-suspend character
(normally ^Y) for the suspend character suspends the send portion of the rlogin, but allows output from the remote system. A different
escape character may be specified by the -e option. There is no space separating this option flag and the argument character.
SEE ALSO
rsh(1C)
FILES
/usr/hosts/* for rhost version of the command
BUGS
More of the environment should be propagated.
4.2 Berkeley Distribution May 12, 1986 RLOGIN(1C)